


First, I will explain how vulnerability alerts are generated in Wazuh.
The Vulnerability Detection module generates alerts when new vulnerabilities appear or when existing vulnerabilities are resolved, for example after package updates, removals, or system upgrades. However, not every detected change generates an alert. Whether an alert is created depends on when and how the change is detected.
Operating system alertsNo alerts are generated during the initial inventory scan.
When a Wazuh agent first synchronizes with the manager, the current operating system version and installed patches are treated as baseline data, not changes.
Alerts are generated only in later scans when:
The operating system version changes, or
New patches are applied after the baseline has already been established.
If the OS was upgraded or patched before the agent completed its first synchronization, no alert will be generated.
Package alertsPackage related vulnerability alerts are generated only when a vulnerability enters or leaves the inventory due to:
Package installation
Package removal
These changes must be detected during a scheduled Syscollector scan.
No alerts are generated if:
The package change occurs while the Wazuh agent is stopped.
The change is detected immediately after an agent restart, before a new inventory baseline is established.
For package vulnerability alerts to trigger, the agent must be running continuously and the change must be detected in a post baseline Syscollector scan.
If it is running correctly, for example every hour, you should see logs similar to:
If you do not see these entries, please recheck the Syscollector configuration in the agent ossec.conf file. You can refer to the Wazuh documentation for guidance.
Check for agent synchronization issues on the manager, run the following command on the Wazuh manager:For checking, install a package with at least one low severity vulnerability on a monitored endpoint while the agent is running. After the next Syscollector scan cycles, check whether the alert is triggered.
You can also run the following curl command to query the Wazuh Indexer directly and check whether vulnerability alerts have already been indexed:
curl -k -u admin:<password> \
"https://<indexer-IP>:9200/wazuh-alerts-*/_search?pretty" \
-H 'Content-Type: application/json' \
-d '{
"query": {
"term": {
"rule.groups": "vulnerability-detector"
}
}
}'
Replace <password> with your Wazuh Dashboard admin user credentials, and replace <INDEXER_IP> with your Wazuh Indexer server IP address.
Check whether this command returns any alerts in the output.
Please share the output of the above commands so we can review them and assist you further.